Fitness Trackers: Holiday Gift Guide
Ghostery Makes Privacy Marketable
Google Contributor: Pay To Block Ads
Retired CIOs: 5 Rewarding Second Acts
10 Holiday Party Attire Atrocities
News & Commentary
Newly Revealed Cyber Espionage Attack 'More Complex' Than Stuxnet, Flame
Kelly Jackson Higgins, Executive Editor at Dark Reading
News
"Regin" cyber spying platform is reportedly behind cyber spying against a Belgian telecommunications provider, which was revealed in leaked NSA documents.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 11/24/2014
Comment0 comments  |  Read  |  Post a Comment
How I Became A CISO: Mark Potter, Danya International
Sara Peters, Senior Editor at Dark Reading
News
Much like one of his favorite choose-your-own-adventure novels, Mark Potter's path to the chief information security officer job was full of twists, turns, and a couple of falls off a cliff.
By Sara Peters Senior Editor at Dark Reading, 11/24/2014
Comment1 Comment  |  Read  |  Post a Comment
DirectTrust Delivers Interoperable Messaging To Healthcare
Alison Diana, Senior Editor
News
The nonprofit counts EHR developers, health networks, and care providers among its growing roster of members.
By Alison Diana Senior Editor, 11/24/2014
Comment0 comments  |  Read  |  Post a Comment
LinkedIn Tips: 5 New Things To Know
Kristin Burnham, Senior Editor, InformationWeek.com
News
LinkedIn's latest updates include blogging and mobile app redesigns, adding certifications to your profile, a custom infographic tool, and WeChat integration.
By Kristin Burnham Senior Editor, InformationWeek.com, 11/24/2014
Comment2 comments  |  Read  |  Post a Comment
Don't Discount XSS Vulnerabilities
Ericka Chickowski, Contributing Writer, Dark Reading
News
XSS flaws are more serious than you'd think.
By Ericka Chickowski Contributing Writer, Dark Reading, 11/24/2014
Comment0 comments  |  Read  |  Post a Comment
Net Neutrality: Too Much Spin, Not Enough Facts
Jonathan Feldman, CIO, City of Asheville, NC
Commentary
Let's move past 1990s regulations and preconceived notions about net neutrality and focus on modern ways to prevent anti-competitive behavior.
By Jonathan Feldman CIO, City of Asheville, NC, 11/24/2014
Comment4 comments  |  Read  |  Post a Comment
4 Big Data Essentials For Startups
Jeff Bertolucci,
News
Data-driven insights aren't just for behemoth enterprises. Here's what startups need to know before embarking on a big-data strategy.
By Jeff Bertolucci , 11/24/2014
Comment0 comments  |  Read  |  Post a Comment
Cyber Security Needs Its Ralph Nader
Tsion Gonen , Chief Strategy Officer, SafeNet
Commentary
It took thousands of unnecessary traffic fatalities to create an environment for radical transformation of the auto industry. What will it take for a similar change to occur in data security?
By Tsion Gonen Chief Strategy Officer, SafeNet, 11/24/2014
Comment2 comments  |  Read  |  Post a Comment
USPS Played Cat And Mouse With Cyber Attacker
Jai Vijayan, Freelance writer
News
Postal Service takes restrained, methodical approach to cyberattack. Was this the right strategy?
By Jai Vijayan Freelance writer, 11/24/2014
Comment1 Comment  |  Read  |  Post a Comment
Samsung Galaxy S5 Sales Tank, CEO In Glare
Eric Zeman,
News
Samsung shipped 40% fewer GS5 smartphones than it expected to, leaving them piled up in warehouses.
By Eric Zeman , 11/24/2014
Comment2 comments  |  Read  |  Post a Comment
IBM Courts DevOps With Dedicated Bluemix
Charles Babcock, Editor At Large, InformationWeek
News
Dedicated Bluemix is IBM's development platform with host servers in the cloud dedicated to a single customer, for security and compliance reasons.
By Charles Babcock Editor At Large, InformationWeek , 11/24/2014
Comment1 Comment  |  Read  |  Post a Comment
Web Search, Transformed: Looking Out For You
Shane O'Neill, Managing Editor, InformationWeek
Commentary
Microsoft Bing director and author Stefan Weitz discusses how sensors, wearables, and big data are changing search.
By Shane O'Neill Managing Editor, InformationWeek, 11/24/2014
Comment0 comments  |  Read  |  Post a Comment
Ghostery Makes Privacy Marketable
Thomas Claburn, Editor-at-Large
News
Service that blocks Web tracking code turns out to be good for business, too.
By Thomas Claburn Editor-at-Large, 11/24/2014
Comment4 comments  |  Read  |  Post a Comment
Fitness Trackers: Holiday Gift Guide
Alison Diana, Senior Editor
News
Wearable fitness devices top many holiday lists this year. Here's how to choose the right one.
By Alison Diana Senior Editor, 11/24/2014
Comment14 comments  |  Read  |  Post a Comment
SDN Rationales
Jim O'Reilly, Consultant
Commentary
Understanding the different motivations for adopting software-defined networking provides a clearer view into the technology.
By Jim O'Reilly Consultant, 11/24/2014
Comment0 comments  |  Read  |  Post a Comment
Is Cloud Security Actually Achievable?
Neil Griffiths, Vice President of UCC Product Management, IntelePeer
Commentary
There's no denying the growth of cloud services, but security is still their biggest hurdle.
By Neil Griffiths Vice President of UCC Product Management, IntelePeer, 11/24/2014
Comment3 comments  |  Read  |  Post a Comment
Cloud Security By The Numbers
Ericka Chickowski, Contributing Writer, Dark Reading
News
Quantifying the perceptions around cloud security practices.
By Ericka Chickowski Contributing Writer, Dark Reading, 11/21/2014
Comment4 comments  |  Read  |  Post a Comment
Google Contributor: Pay To Block Ads
Kristin Burnham, Senior Editor, InformationWeek.com
News
Google launched a new service that blocks ads on some websites in exchange for a nominal monthly subscription.
By Kristin Burnham Senior Editor, InformationWeek.com, 11/21/2014
Comment16 comments  |  Read  |  Post a Comment
Geekend: Replacing the Turing Test
David Wagner, Community Editor
Commentary
We need a better way to test artificial intelligence.
By David Wagner Community Editor, 11/21/2014
Comment9 comments  |  Read  |  Post a Comment
The Week When Attackers Started Winning The War On Trust
Kevin Bocek, VP Security Strategy & Threat Intelligence, Venafi
Commentary
The misuse of keys and certificates is not exotic or hypothetical. It’s a real threat that could undermine most, if not all, critical security controls, as recent headlines strongly show.
By Kevin Bocek VP Security Strategy & Threat Intelligence, Venafi, 11/21/2014
Comment1 Comment  |  Read  |  Post a Comment
More Stories
Current Conversations
More Conversations
PR Newswire
Firefox Drops Google For Yahoo Search
Thomas Claburn, Editor-at-Large,  11/20/2014
Tech Hygiene: 10 Bad Habits To Break
Jeff Bertolucci 11/18/2014
Google Contributor: Pay To Block Ads
Kristin Burnham, Senior Editor, InformationWeek.com,  11/21/2014
Register for InformationWeek Newsletters
Partner Perspectives
What's This?
You're Doing BYOD Wrong: These Numbers Prove It
Almost 40% of users who connect personal mobile devices to corporate networks have no lock-screen mechanism set in place. Read >>
White Papers
Current Issue
InformationWeek Tech Digest, Nov. 10, 2014
Just 30% of respondents to our new survey say their companies are very or extremely effective at identifying critical data and analyzing it to make decisions, down from 42% in 2013. What gives?
Flash Poll
Building a Mobile Business Mindset
Building a Mobile Business Mindset
The differences between mobile apps and conventional Windows clients, or even web applications, are far more than skin deep. Yes, the touch-versus-keyboard interface, APIs, and programming languages are new, but that’s arguably the easy part. There are profound differences in how the two are built, the functionality each prioritizes, the release cycles on which they’re developed — even the attitudes, values, and work styles of the developers creating them.
Steal Our Slides
InformationWeek 2014 Healthcare IT Priorities Survey
InformationWeek 2014 Healthcare IT Priorities Survey
Health IT pros are focused on government mandates and programs, which leaves little time to optimize the new technology they've added over the last few years.
Video
Sponsored Video
Slideshows
Twitter Feed
InformationWeek Radio
Archived InformationWeek Radio
Join us for a roundup of the top stories on InformationWeek.com for the week of November 16, 2014.
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.